/system/netd/include/ |
H A D | Permission.h | 21 // the permission the app (UID) has been granted. When applied to a network, it's the permission an 22 // app must hold to be allowed to use the network. PERMISSION_NONE means "no special permission is 23 // held by the app" or "no special permission is required to use the network". 28 // android.permission.INTERNET framework permission. 31 // such as those that hold the android.permission.CHANGE_NETWORK_STATE framework permission. 34 // partition, those that hold the android.permission.CONNECTIVITY_INTERNAL framework permission an 42 permissionToName(Permission permission) argument [all...] |
H A D | Fwmark.h | 30 Permission permission : 2; member in struct:Fwmark::__anon1890
|
/system/netd/server/ |
H A D | PhysicalNetwork.cpp | 31 Permission permission, PhysicalNetwork::Delegate* delegate) { 32 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { 36 if (int ret = delegate->addFallthrough(interface, permission)) { 43 Permission permission, 46 permission)) { 50 if (int ret = delegate->removeFallthrough(interface, permission)) { 72 int PhysicalNetwork::destroySocketsLackingPermission(Permission permission) { argument 73 if (permission == PERMISSION_NONE) return 0; 77 ALOGE("Error closing sockets for netId %d permission change", mNetId); 80 if (int ret = sd.destroySocketsLackingPermission(mNetId, permission, 30 addToDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument 42 removeFromDefault(unsigned netId, const std::string& interface, Permission permission, PhysicalNetwork::Delegate* delegate) argument 89 setPermission(Permission permission) argument [all...] |
H A D | PhysicalNetwork.h | 33 Permission permission) WARN_UNUSED_RESULT = 0; 35 Permission permission) WARN_UNUSED_RESULT = 0; 43 int setPermission(Permission permission) WARN_UNUSED_RESULT; 52 int destroySocketsLackingPermission(Permission permission);
|
H A D | RouteController.h | 50 Permission permission) WARN_UNUSED_RESULT; 52 Permission permission) WARN_UNUSED_RESULT; 74 Permission permission) WARN_UNUSED_RESULT; 76 Permission permission) WARN_UNUSED_RESULT; 91 Permission permission) WARN_UNUSED_RESULT; 93 Permission permission) WARN_UNUSED_RESULT; 108 Permission permission, bool add);
|
H A D | RouteController.cpp | 417 Permission permission, bool add) { 423 fwmark.permission = permission; 486 fwmark.permission = PERMISSION_SYSTEM; 487 mask.permission = PERMISSION_SYSTEM; 503 Permission permission, uid_t uidStart, 514 fwmark.permission = permission; 515 mask.permission = permission; 416 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument 502 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 525 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 553 modifyImplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, bool add) argument 576 modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 709 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument 787 modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission) argument 942 addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 951 removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, Permission permission) argument 1019 addInterfaceToDefaultNetwork(const char* interface, Permission permission) argument 1023 removeInterfaceFromDefaultNetwork(const char* interface, Permission permission) argument 1046 addVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 1051 removeVirtualNetworkFallthrough(unsigned vpnNetId, const char* physicalInterface, Permission permission) argument [all...] |
H A D | FwmarkServer.cpp | 91 Permission permission = mNetworkController->getPermissionForUser(client->getUid()); local 94 if ((permission & PERMISSION_SYSTEM) != PERMISSION_SYSTEM) { 120 permission = static_cast<Permission>(permission | fwmark.permission); 204 permission = PERMISSION_NONE; 230 permission = static_cast<Permission>(permission | fwmark.permission); 235 if ((permission [all...] |
H A D | NetworkController.cpp | 76 Permission permission, bool add) WARN_UNUSED_RESULT; 80 Permission permission) override WARN_UNUSED_RESULT; 82 Permission permission) override WARN_UNUSED_RESULT; 84 int modifyFallthrough(const std::string& physicalInterface, Permission permission, 99 Permission permission, bool add) { 103 permission)) { 111 permission)) { 121 Permission permission) { 122 return modifyFallthrough(physicalInterface, permission, true); 126 Permission permission) { 97 modifyFallthrough(unsigned vpnNetId, const std::string& physicalInterface, Permission permission, bool add) argument 120 addFallthrough(const std::string& physicalInterface, Permission permission) argument 125 removeFallthrough(const std::string& physicalInterface, Permission permission) argument 130 modifyFallthrough(const std::string& physicalInterface, Permission permission, bool add) argument 324 createPhysicalNetwork(unsigned netId, Permission permission) argument 439 setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids) argument 452 setPermissionForNetworks(Permission permission, const std::vector<unsigned>& netIds) argument 553 Permission permission = reinterpret_cast<PhysicalNetwork*>(network)->getPermission(); local 670 Permission permission = static_cast<PhysicalNetwork*>(network)->getPermission(); local [all...] |
H A D | NetworkController.h | 69 int createPhysicalNetwork(unsigned netId, Permission permission) WARN_UNUSED_RESULT; 77 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids); 79 int setPermissionForNetworks(Permission permission,
|
H A D | NetdNativeService.cpp | 48 const char CONNECTIVITY_INTERNAL[] = "android.permission.CONNECTIVITY_INTERNAL"; 49 const char DUMP[] = "android.permission.DUMP"; 51 binder::Status checkPermission(const char *permission) { argument 55 if (checkCallingPermission(String16(permission), (int32_t *) &pid, (int32_t *) &uid)) { 58 auto err = StringPrintf("UID %d / PID %d lacks permission %s", uid, pid, permission); 84 #define ENFORCE_PERMISSION(permission) { \ 85 binder::Status status = checkPermission((permission)); \ 91 #define NETD_LOCKING_RPC(permission, lock) \ 92 ENFORCE_PERMISSION(permission); \ [all...] |
H A D | ClatdController.cpp | 78 fwmark.permission = PERMISSION_SYSTEM;
|
H A D | SockDiag.h | 72 int destroySocketsLackingPermission(unsigned netId, Permission permission,
|
H A D | SockDiagTest.cpp | 290 Permission permission; member in struct:android::net::__anon1908 357 fwmark.permission = permissionTestcases[i].permission; 424 Permission permission = permissionTestcases[i].permission; 425 return permission != PERMISSION_NETWORK && permission != PERMISSION_SYSTEM;
|
H A D | SockDiag.cpp | 389 // 1. The opening app no longer has permission to use this network, or: 390 // 2. The opening app does have permission, but did not explicitly select this network. 397 int SockDiag::destroySocketsLackingPermission(unsigned netId, Permission permission, argument 413 controlMark.permission = permission; 434 // If explicit and permission bits match, go to the JMP below which rejects the socket 468 if (int ret = destroyLiveSockets(shouldDestroy, "permission change", iov, ARRAY_SIZE(iov))) { 473 ALOGI("Destroyed %d sockets for netId %d permission=%d in %.1f ms", 474 mSocketsDestroyed, netId, permission, s.timeTaken());
|
H A D | TetherController.cpp | 180 fwmark.permission = PERMISSION_SYSTEM; 253 fwmark.permission = PERMISSION_SYSTEM;
|
H A D | CommandListener.cpp | 1437 // network create <netId> [permission] 1455 Permission permission = PERMISSION_NONE; local 1457 permission = stringToPermission(argv[3]); 1458 if (permission == PERMISSION_NONE) { 1459 return syntaxError(client, "Unknown permission"); 1462 if (int ret = gCtls->netCtrl.createPhysicalNetwork(netId, permission)) { 1505 // network permission user set <permission> <uid> ... 1506 // network permission user clear <uid> ... 1507 // network permission networ 1514 Permission permission = PERMISSION_NONE; local [all...] |
/system/security/keystore/ |
H A D | key_store_service.h | 155 * permission and if acting on other uids the grants to do so. 157 bool checkBinderPermission(perm_t permission, int32_t targetUid = UID_SELF); 161 * permission and the target uid is the caller or the caller is system. 163 bool checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid); 167 * permission or the target of the operation is the caller's uid. This is 168 * for operation where the permission is only for cross-uid activity and all 172 bool checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid); 175 * Helper method to check that the caller has the required permission as 178 * Returns NO_ERROR on success, PERMISSION_DENIED on a permission error and 182 KeyStoreServiceReturnCode checkBinderPermissionAndKeystoreState(perm_t permission, [all...] |
H A D | key_store_service.cpp | 554 ALOGW("permission denied for %d: getmtime", targetUid); 589 ALOGW("permission denied for %d: duplicate", callingUid); 1318 ALOGW("addAuthToken: permission denied for %d", IPCThreadState::self()->getCallingUid()); 1432 sp<IBinder> binder = defaultServiceManager()->getService(String16("permission")); 1437 String16("android.permission.READ_PRIVILEGED_PHONE_STATE"), 1500 // TODO(tuckeris): add permission check. This should be callable from ClockworkHome only. 1535 * permission and if acting on other uids the grants to do so. 1537 bool KeyStoreService::checkBinderPermission(perm_t permission, int32_t targetUid) { argument 1540 if (!has_permission(callingUid, permission, spid)) { 1541 ALOGW("permission 1555 checkBinderPermissionSelfOrSystem(perm_t permission, int32_t targetUid) argument 1572 checkBinderPermissionOrSelfTarget(perm_t permission, int32_t targetUid) argument 1590 checkBinderPermissionAndKeystoreState(perm_t permission, int32_t targetUid, bool checkUnlocked) argument [all...] |
/system/bt/stack/gatt/ |
H A D | gatt_db.cc | 83 tGATT_PERM perm = attr.permission; 168 __func__, attr16.uuid, attr16.permission, sec_flag, offset, read_long); 355 * perm: permission (authentication and key size requirements) 426 * perm: characteristic descriptor permission type. 555 tGATT_PERM perm = p_attr->permission; 560 GATT_TRACE_DEBUG("%s: p_attr->permission =0x%04x min_key_size==0x%04x", 561 __func__, p_attr->permission, min_key_size); 721 attr.permission = perm;
|
H A D | gatt_int.h | 170 tGATT_PERM permission; member in struct:__anon915
|
/system/nfc/halimpl/bcm2079x/gki/common/ |
H A D | gki_buffer.c | 1093 ** permission - (input) GKI_PUBLIC_POOL or 1100 uint8_t GKI_set_pool_permission(uint8_t pool_id, uint8_t permission) { argument 1104 if (permission == GKI_RESTRICTED_POOL) 1344 ** permission - (input) restricted or public access? 1355 uint8_t GKI_create_pool(uint16_t size, uint16_t count, uint8_t permission, argument 1384 (void)GKI_set_pool_permission(xx, permission);
|
/system/nfc/src/gki/common/ |
H A D | gki_buffer.c | 1093 ** permission - (input) GKI_PUBLIC_POOL or GKI_RESTRICTED_POOL 1099 uint8_t GKI_set_pool_permission(uint8_t pool_id, uint8_t permission) { argument 1103 if (permission == GKI_RESTRICTED_POOL) 1340 ** permission - (input) restricted or public access? 1350 uint8_t GKI_create_pool(uint16_t size, uint16_t count, uint8_t permission, argument 1379 (void)GKI_set_pool_permission(xx, permission);
|
/system/tpm/tpm_manager/server/ |
H A D | tpm_nvram_impl.cc | 435 MapAttributesFromTpm(info.permission.attributes, attributes);
|